When determining access to a particular DASD data set, CA Top Secret must evaluate both volume and data set access authorizations. Volume level checking can optionally be bypassed. However, in situations where both volume and data set level checking is done, CA Top Secret performs volume-level checking first. Thus, a request to access a data set can be granted or failed strictly on the basis of the user’s volume access authorization.
Based on the CA Top Secret security validation algorithm, does a problem still exist?
|
Copyright © 2009 CA.
All rights reserved.
|
|